Sunteți pe pagina 1din 2

Introduction to

Cryptography Theory

이 훈 재 (李 焄 宰)
Hoon-Jae Lee
CNSL
Cryptography and Network Security Lab.
hjlee@dongseo.ac.kr

http://kowon.dongseo.ac.kr/~hjlee
http://crypto.dongseo.ac.kr
http://crypto.dongseo.ac.kr

2007-03-15 CNSL-Internet-DongseoUniv. 1

Introduction
‰ In this subject, we will study
¾ the Cryptography Theory & Information Security.
‰ At first, we will study
¾ the theorem of the Cryptography and Network Security,
¾ Stream Cipher(eCRYPT, eSTREAM),
¾ Block Cipher(DES, AES, SEED, ARIA, CAMELIA),
¾ Public-Key Cryptosystems(RSA, ECC, ElGamal),
¾ Digital Signature(DSS, KC-DSA),
¾ Hash Function(SHA-1, SHA-256, HAS-160),
¾ PKI(Public-Key Infrastructure).
‰ In Special, we improved to
¾ the ability for the design, or the implementation, or
application of INFORMATION SECURITY in TERM
PROJECT and TERM PAPER.

2007-03-15 CNSL-Internet-DongseoUniv. 2

1
TextBook
‰ Textbook 1. Wade Trappe, Lawrence Washington, "Introduction to Cryptography
with coding theory(2nd Ed.)," Prentice-Hall, 2006.
2. William Stallings "Cryptography and Network Security (4th Edition),"
Prentice-Hall, 2006.1.
‰ Topics

Ch 1. Overview of Cyrptography and Its Applications


Ch 2, Classical Cryptosystems
Ch 3. Basic Number Theory
Ch 4. Data Encryption Standard
Ch 5. Advanced Encryption Standard: Rijndael
Ch 6. RSA Algorithms
Ch 7. Discrete Logarithms
Ch 8. Hash Functions
Ch 9. Digital Signatures
Ch10. Security Protocols
Ch11. Digital Cash
Ch12. Secret Sharing Schemes
Ch13. Games
Ch14. Zero-Knowledge Techniques
Ch15. Information Theory
Ch16. Elliptic Curves
Ch17. Lattice Methods
Ch18. Error Correcting Codes
Ch19. Quantum Techniques in Cryptography

2007-03-15 CNSL-Internet-DongseoUniv. 3

Evaluation
‰* Attendance : 10%
‰* Presentation : 20%
¾ Paper and Project Presenting
‰* Term Project : 30% (Team based)
¾ Term Paper 10% (Team based)
‰* Final Exam : 40% (no Mid-Term
Exam)

2007-03-15 CNSL-Internet-DongseoUniv. 4

S-ar putea să vă placă și